According to a recent Conference Board survey, cybersecurity risks are the number one fear U.S. CEOs face in 2019. More money is being spent on cybersecurity than ever before, so how is it possible that organizations of every stripe, from NASA to the city of Baltimore, have still had their systems breached? One obvious answer… Read more »

Sending regular emails can keep you top-of-mind for prospects and let you demonstrate your expertise so that when they need a hand with IT, you’re the first one they contact. We’ve explored the fundamentals of email campaign management in previous posts, but what goes in your emails warrants its own discussion. In particular, let’s look… Read more »

We often write about the challenges organizations in various industries face when it comes to data management. From healthcare to education, several sectors are trying to determine how to organize and analyze the vast amounts of data they store. Law enforcement, in particular, is one industry that’s finding it hard to cope. Law enforcement agencies… Read more »

The global information technology industry is on pace to reach $5 trillion this year. Although IT is a thriving market and an excellent business to be in, there are still challenges common to all MSPs. Cybersecurity, infrastructure management, and data protection can be challenging areas for MSPs. But many of the biggest hurdles for growing… Read more »

Since the cloud emerged on the scene as a revolutionary concept in the mid-1990s, the way businesses store, sort, and protect their data has completely changed. The cloud is a time- and money-saver and almost always a safe bet. According to Domo, we, as a society, create over 2.5 quintillion bytes of data every single… Read more »

The artificial intelligence market is growing fast. According to Stanford University’s AI Index, there’s been a 14X increase in AI startups since the year 2000. Jobs requiring AI skills have grown 4.5X since 2013. Forward-thinking companies are considering how AI fits in their organizations, and many of them have a defined AI strategy already. For… Read more »

Last year, technical failures due to defects and cyberattacks were so widespread that ZDNet termed it “miserable,” and MIT Technology Review called it a “bumper year” for misfires. The hope was that 2019 would be much better. Unfortunately, that’s not been the case. From various cities being held for ransom by cyberattacks to IT outages… Read more »

Whether you’re in the technology field or not, you know how important experience is when it comes to finding a job or advancing your career. But the need for experience can put job seekers in a tough spot. You need experience to get a job, but you need a job to get experience. How do… Read more »

The companies that thrive over the next few years will be the ones harnessing the power of data, yet most companies don’t analyze much more than a third of the data they have. With data so critical to business success, your clients should think about data intelligence along with data storage. But does your current… Read more »

Good documentation does not happen by chance. In a world where everyone is a publisher, the ability to create documentation has never been easier. But creating quality documentation that provides value to the reader takes practice and discipline. The best documentation helps transfer knowledge to the reader while anything less often causes confusion. The same… Read more »

At least one day a week, 70 percent of employees around the world work remotely, exposing companies to a multitude of security headaches such as phishing attacks, unsecured servers, and weak passwords. Factor in the workers who also use cafes, coffee shops, or airport terminals to do company work, and the headache can turn into… Read more »

IT certifications are more than badges of honor. They validate your proficiency and prove to employers or clients that you know your stuff and hone your skills. Since the tech world moves so fast, it’s crucial for IT professionals to understand new technologies and what they mean for today and the future. Certifications are among… Read more »

Although we often hear about the threat of foreign cyberattacks, the truth is that one of the biggest threats to small and medium-sized American companies is former employees. An AppRiver survey finds that 24 percent of small and midsize businesses (SMBs) are concerned that attacks will come from dissatisfied ex-employees rather than publicized threats from… Read more »

Something a lot of IT providers struggle with is deciding exactly what to provide. Should you offer a la carte or custom IT services for each customer? Or should you use a one-size-fits-most approach across as many customers as you can? For some context, think about the experience of using a Mac vs. a PC…. Read more »

Any MSP can back up client data. But high-caliber MSPs know that business continuity is about more than backups. A great business continuity strategy requires flexible recovery options, simplified management, and perhaps most importantly, quick recoveries that minimize downtime. These days MSPs can choose from many backup and recovery solutions. But finding one that boasts… Read more »

Forgot your password? Got a computer virus? Can’t figure out why your report won’t print? If so, then you’re probably like the thousands of other people who are confronted with such problems and do the one thing guaranteed to solve such issues: Call the system administrator. System administrators don’t wear superhero capes (although they may… Read more »

Managed service providers depend on long, trusting relationships with their clients. Forging a lasting bond with customers begins the moment you come in contact with them, but the onboarding process in particular is critical. This is when you must prove to clients they chose the right provider. The onboarding process will differ from company to… Read more »

When you hear the term “brute-force attack,” you may think about a savagely violent person or animal aggressively attacking another being. But if you’re in cybersecurity, you may envision something completely different—although no less frightening. In technology, a brute-force attack is when a hacker uses automated software to hammer an organization’s system with usernames, passwords,… Read more »

Few topics catch at the attention of the media like a data breach at a large company. When Target, Home Depot, and Equifax suffered data breaches, their stories were covered by every major network. Moreover, the news traveled fast and far given the millions of consumers who had their private data stolen. Large companies like… Read more »

As we continue to follow the developments and decisions around Brexit in the U.K., we want to address questions about the flow of personal data between the U.K. and EEA that some U.K.-based users of StorageCraft Cloud Products, including StorageCraft Cloud Services (SCS) and StorageCraft Cloud Backup, may have. Generally, StorageCraft believes that concern about… Read more »

Technology is rapidly changing how we conduct business. IT departments are undergoing drastic changes as their efforts spill over into sales, customer service, accounting, and other key areas. In some organizations, IT is a multifaceted spark plug that drives all aspects of the business. With a much bigger role to play, the importance of having… Read more »

The hackers of today are bold and sophisticated and they’re looking for the next big score. According to a recent study by Ponemon Institute, the probability that a company will experience data breach increases year over year, and the average cost of a data breach incident is a whopping $3.86 million. Interestingly enough, sensitive data… Read more »

MSPs need to be strategic as they develop and maintain storage infrastructure for their clients. Solutions must be affordable, scalable, and easy to manage. It’s a big challenge, but luckily, storage tech is more powerful and sophisticated than ever. If you’re thinking of ways to help clients take advantage of the latest in storage, keep… Read more »

The risk associated with artificial intelligence (AI) is a popular topic these days. Will AI take human jobs and become an enemy of the people? Will AI develop killer robots with no moral compass? Will AI become a superpower with greater control over humans? These are all important issues, but those tasked with cybersecurity currently… Read more »

Research firm Forrester predicts that hyper-converged systems will “become ubiquitous” as a common platform for deploying on-premises infrastructure. Compared to legacy infrastructure approaches, converged infrastructures promise lower costs, more scalability, and more flexible management. But as with any technology, there are a few competing philosophies in the infrastructure realm. How do you know whether to… Read more »

Ransomware threats continue to grow in 2019 as cybercriminals become sneakier and more targeted in their efforts, which means only organizations that are continuously proactive in maintaining security may come away unscathed. Consider the latest: The group behind the Dharma ransomware is now bundling it inside a fake antivirus software installation. Phishing emails that reportedly… Read more »

Although every business has challenges in growing revenue, MSPs will continue to face three in particular in 2019 and beyond: 1) How do you keep current customers satisfied when the customer experience is more critical than ever? 2) How do you attract new customers so you can grow and thrive? 3) How do you do… Read more »

For many SMBs, it’s practical to use a private cloud for everything from software as a service to storage infrastructure and more. With benefits like cost savings, live support, and more, it’s tempting for enterprises to also ditch their hybrid cloud infrastructure in favor of public cloud offerings. But before you jump ship altogether, there… Read more »

Sophisticated MSPs know that trading basic backups for SLA-driven disaster recovery as service (DRaaS) offers outstanding profitability. But for many, DRaaS isn’t the easy-to-manage cash-cow it should be. To provide high availability and maximum data protection, MSPs may have to work with a complex array of vendors, solutions, and (sometimes messy) integrations, resulting in unnecessary… Read more »

Research shows that companies are losing billions of dollars by not having the necessary cloud professionals. Why? Because fewer cloud professionals means there is less innovation and revenue. That may be why some companies are actually hiring tech people before there are jobs available – they know the talent pipeline isn’t overflowing and they don’t… Read more »

MSPs are responsible for stopping downtime, safeguarding data, and ensuring that no disaster—large or small—stops the productivity of their clients. It’s no easy task when MSPs must juggle vendors, become experts in various solutions, and integrate them, all while trying to make operations run as efficiently as possible. We expanded the functionality of ShadowXafe™ to… Read more »

As a StorageCraft evangelist, I find it worthwhile to download and read competitors’ white papers. This tactic usually gives me a good angle on the strengths and weaknesses of different vendors’ product offerings. Well, very recently I downloaded a “buyer’s guide” type document from another vendor. The buyer’s guide was tailored to the vendor’s own… Read more »

In March of 2018, the city of Atlanta spent more than $2.6 million responding to a ransomware attack that targeted its municipal operations. While city officials won’t confirm whether they paid the $50,000 ransom, it is clear that the price the city paid for its recovery efforts have far exceeded the ransomware demand. Ransomware attacks… Read more »

Imagine finding out the hard way that your home alarm system wasn’t working. You arrive home to an open front door with your personal items scattered around your place. Some expensive purchases—jewelry, your stereo system, or your computer—are missing. You get in touch with the home security company and alert them to the fact that… Read more »

If you own or work for an MSP, you’ll likely understand the struggles of developing the perfect solution for your clients. Besides all the difficulties that go along with pricing your services, deciding which services will sell well and should be bundled together can be a real challenge. One thing’s for sure, if your MSP… Read more »

As an IT pro, you know that data breach is a real risk. Your clients, however, probably haven’t thought about it as much. If your job is to keep them productive and their data safe, you must know how to broach the topic of data breach. Here’s an approach that will help them understand the… Read more »

If you’re in the education sector, you understand just how much data schools collect. Student records, teacher information, lesson plans, attendance lists, and so much more all have to be housed in a secure and accessible environment. Sadly, many schools are years behind where they should be with their management software. Because funding is hard… Read more »

The online world is still the wild west. A few wrong clicks can lead a user down a path to ransomware, viruses, and all sorts of nasty stuff. In order to keep each of these end points locked down, it’s crucial for MSPs to keep end users’ online experience safe and private. Your job is… Read more »

Data security has come a long way since its early days of simple scans and firewalls. Though there are certain older tools and techniques that are still valuable today, there are other methods of security that every single business should be employing. Here are seven of those: Perfect Your Passwords At the top of the… Read more »

A Kaspersky Lab survey finds that 75 percent of respondents report that the number of passwords they have to manage causes them stress, which may explain why there are 23.2 million accounts using “123456” as a password and three million accounts using “password” as a password. In addition, 68 percent report they are stressed about… Read more »

While many top leaders now tout the value of data to their organizations, there may a distinct lack of enthusiasm by rank-and-file employees for embracing data on a regular basis. That disconnect can spell trouble for organizations that are trying to use data to be more competitive or innovative. Without complete employee buy-in, the data-integration… Read more »

Every business needs a data security strategy. A company’s data is its source of revenue, and the fuel to keep business moving along. So, imagine if that data disappeared. How would they be able to run their website or measure their inventory? When it comes to school data, the consequences of deletion by a disaster… Read more »

What makes the perfect target for a cybercriminal? A business that’s rich with sensitive information about their clients. One in particular? Healthcare providers. Consider just how much information a facility like a hospital holds concerning its doctors, nurses, and patients. Many of these stored details, especially patient files, are not only sensitive in nature but… Read more »

There are two main reasons healthcare providers are currently placing more emphasis on IT and data security: big data and ransomware attacks. Over the past few years, the amount of data collected and stored by organizations in every industry is astronomical. Where healthcare differs is in the number of crucial discoveries that could come from… Read more »

Hacks happen all the time. The Global Threat Report released by Carbon Black estimates that in 2018, about 1 million cyberattacks per day were attempted. All businesses are at risk on a daily basis and need to take proper data security precautions. How you do so and which data you protect should all depend on… Read more »

Cyberattacks are escalating each year. No matter who you are, some of your personal information was probably compromised in 2018. Businesses have lost tens of millions. Data for billions of consumers is no longer secure. The security gaps in the online world are growing. Luckily, there are a number of startups putting a stop to… Read more »

Organizations are under pressure to make decisions faster than ever before, and often rely on data to make those decisions. While companies may believe that’s a sound strategy, it actually may be harming their ability to compete and come up with innovative solutions, experts say. The reason is because many business leaders seem to abandon… Read more »

Businesses are using the cloud for all sorts of things these days. From data storage to remote workspaces and big data analysis, the cloud can benefit a company in a myriad of ways — one being data backup and recovery. At StorageCraft, we use the cloud to back up your files for quick and easy… Read more »

In celebration of the upcoming World Backup Day (March 31st), this post is dedicating to remembering the importance of backups and looking at how far we’ve come in the data storage industry. The evolution of technology has made it so the majority of our days consist of some form of data consumption. Whether we’re online… Read more »

Over the years in IT, we’ve all had tasks become more efficient due to the improvements and evolution in technology. Heck, even a fairly recent college grad in an IT-based major can attest to technological changes over their time in school to their present career position. Conversations with other IT professionals who’ve been in the… Read more »

Big data is making waves in almost every industry. No matter the sector, businesses are always working on the way they collect, store, sort, and use their data to improve processes and uncover customer patterns. One industry that is harnessing big data in a major way is healthcare. What is Healthcare Analytics? When big data… Read more »

From eCommerce to education, a disaster recovery plan is essential to the survival of any business that stores any amount of data. And it doesn’t matter if you store two gigabytes of data or two terabytes. That said, there are some companies and industries that are more vulnerable to disruption and downtime than others. One… Read more »

School databases contain some of the most sensitive information concerning students and faculty members. From grades to health records, addresses to contact information, schools have a lot to lose if they’re caught off guard by a hacker. That’s why developing a plan to keep data security tight is essential to complying with privacy laws and… Read more »

Thieves, vandals, pranksters, and whistle-blowers are exploiting system vulnerabilities and harvesting data right this second. Companies can face millions in losses and private citizens can have their most private information exposed to the public if the wrong person access the wrong things. Any company can be a target, but the world’s most notorious hacks, leaks,… Read more »

As more organizations turn to data analytics as an integral part of their growth strategy, many leaders may harbor some doubts. How will data analytics work in the real world when it comes time to make critical business decisions? Will the organization really be able to use data analytics effectively, or will it become another… Read more »

IT teams have many important jobs, and one of those is drafting a data security strategy for their business. And, since no plan is perfect, a key part of this strategy is devising a plan of action in case a hacker infiltrates the security measures in place. Here are a few steps you may consider… Read more »

Picture this: you walk into the office in the morning, only to find the majority of staff in your MSP have been locked out of their computers. A message appears asking for extortionate amounts of bitcoin in order to have your data restored. While this is happening, staff are texting their friends and family about… Read more »

It’s unlikely that anyone with an email address hasn’t received a phishing email at least once in their online life. In fact, Cybersecurity Ventures reports that since 2013, there’s an average of 3.8 million records stolen from data security breaches every day. Open your spam folder or inbox now, and it’s likely you’ll see some… Read more »

No two clouds are exactly alike. That being said, many clouds are very similar and essentially have the same functionality. The difference lies in the way they’re used by each individual business. Every company has different cloud needs and, therefore, will build or alter their cloud technology to work for whatever those needs are. Here’s… Read more »

In this time of heightened security concerns, most employers have sternly warned employees not to use passwords like “password,” but that doesn’t mean companies are making significant headway in eliminating the problem of weak passwords that compromise an organization’s security. The LastPass 2018 Global Password Security Report reports the average password security score of more… Read more »

There are some classic signs that your email has been hacked, but many won’t be apparent to you until someone gets in touch to point them out. Oftentimes, a hacker will use your account to send spam emails or phishing messages to your contact list. The only way you might notice an email data security… Read more »

When Hurricane Sandy finished blasting through New York and New Jersey in 2012, she left in her wake billions of dollars in damages to homes and businesses. Fires, power outages, storm surges, flooding, and gale-force winds gut-punched many companies, highlighting their vulnerabilities when it came to recovering data and restoring their technology systems after a… Read more »

Think of how much time your technicians spend addressing help desk tickets and how much money is spent on hours dedicated to these, often times, menial tasks. One excellent solution to reduce hours logged on client IT assistance is to keep a compendium of client knowledge and manage that knowledge base appropriately. Knowledge Base As… Read more »

More companies now understand that the data they collect can provide new opportunities to boost the bottom line and provide a competitive advantage, but there still remains distinct challenges about how to use data to its full potential while ensuring it remains secure. There has been plenty in the news about the challenges of securing… Read more »

You’ve probably heard the stats on data breach. Ponemon reports that a data breach costs on average $3.86 million, and even a single lost record can cost $148! While these numbers sound menacing, the real cost of a data breach will be much lower for many businesses because it depends on variables like the number… Read more »

Need a kick in the butt to bolt down your data protection strategy? Look no further than the tumultuous world of cybersecurity. According to an annual study conducted by Ponemon Institute, the average cost of a data breach reached $3.86 million in 2018, a 6.4 percent increase over the previous year. The study also reported… Read more »

Big Data has changed the workplace in many ways. Businesses are now having to search for methods of storage which are more expansive and flexible than ever before. Plus, we’re seeing a shift from SMBs with a focus on data storage to a focus on finding effective sorting methods. This is because they now need… Read more »

The new year is in full swing, and though January is often a slow month for many businesses, hackers and cyber-attacks never settle down. In 2018, companies suffered a lot of loss to the hands of cyber-criminals. According to Ponemon Institute’s 2018 Cost of a Data Breach study, the cost of the average data breach… Read more »

Being able to keep a business running smoothly is more critical than ever in today’s competitive environment, and any interruption in service can lead to serious – even fatal – consequences. But trying to keep a business continually operating at a high level is demanding for any organization. Just consider some of the challenges: Cyberattacks:… Read more »

It doesn’t matter how much work you put into cybersecurity awareness within your company if you have any vulnerabilities in your system, software, or strategy. You’re leaving holes hackers can easily access. That’s where unpatched software can damage your business. What is Unpatched Software? Every software has the potential to have bugs and holes. After… Read more »

There’s nothing quite like the feeling of finding free Wi-Fi. Whether it’s at a cafe or in an airport, public-access Wi-Fi can be a life-saver. It can also be a death sentence for your data, though. If you end up connecting to an unsecured network, you open yourself and your data up to malicious users with the… Read more »

The cloud has become one of the most popular methods of storage available to date. Whether for personal use or for business, its security, accessibility, and convenience have made it the perfect companion for data of all shapes and sizes. If you have experience with cloud technology, you’ll know there are three main types currently… Read more »

Whether it’s been internally developed or sourced from elsewhere, a lot of businesses are storing their data on the cloud. It’s not hard to see why, there are a plethora of benefits to cloud storage, including its accessibility from remote locations, and the ease of incorporating the cloud into one’s disaster recovery strategy. It seems… Read more »

Choosing how to run your data center is like choosing between buying and leasing a car: each has specific advantages and risks. What works for you today, might not suit your needs tomorrow, and each comes with a different cost structure. Security, control, and cost all factor into this major decision, however, it’s not always… Read more »

In 2019, the world will mark the 75th anniversary of the invention of the Rubik’s Cube and the 50th anniversary of Woodstock – but chances are also good that it will be the year your organization is hit by one of the daily insidious cyberattacks. Verizon reports that in the 12-month period ending in March… Read more »

You know those pesky spam emails that manage to get through filters? Some of them may seem quite normal, just from a random sender. Some tell users to click a link to enter contests or download a necessary security update. However, if these emails usually seem a bit fishy, it’s because they are. Phishing emails… Read more »

As more companies relentlessly drive toward digital transformation as a way to be more competitive, technology and business leaders must decide how best to embrace these technology changes while making sure security doesn’t fall behind. By the end of this year, businesses worldwide are expected to have spent $1.1 trillion on digital transformation technology and… Read more »

It’s a story recognized by a large number of SMBs operating today. Something happens to an employee’s computer. They take a little while to try to resolve the problem themselves. Then they ask their colleagues to diagnose their issue. And in a last ditch effort to get their machine going, they contact IT. The IT… Read more »

It’s a common belief that most cybersecurity breaches are limited to external threats. However, a large percentage of security issues arise internally, too. One in four breaches involves internal actors according to the Data Breach Investigations Report by Verizon. This is where a Zero Trust approach to cybersecurity comes in handy. What Are the Details?… Read more »

So, the family deserted me this evening, and I found myself sitting here enjoying some Enzian with a Partagás cigar. Yes, Dad’s night out at home. Gotta make it worthwhile, right? Now this cigar, liqueur, tech stuff is not all that disjointed as some may initially think. First, let’s talk about Partagás and Enzian. The Partagás… Read more »

In business, customer experience is a battlefield. Many companies are competing solely on their ability to find customers and keep them satisfied. If they can’t, the end up churning through current customers and burning funds finding new ones. A single bad experience is often enough to make someone leave. Research done by customer strategy firm… Read more »

Managed Service Provider (MSP) has become a bit of a buzz term in business lately, and that makes complete sense. When it comes to IT, companies need to be able to trust that their technology infrastructure is going to hold up through anything. In fact, in most cases, modern organizations rely entirely on the functionality… Read more »

Big data is built on combing large amounts of information to uncover actionable insights. While the trend took flight in recent years, the concept itself is nothing new. In fact, companies have been gleaning data for business value since the 1950s. Instead of high-tech computers, they used spreadsheets and processed everything manually. Advanced technology has… Read more »

Whether you’re an IT admin or an MSP managing tech for a bunch of clients, simple user problems can take a huge portion of your time. Maybe someone doesn’t know how to map a network drive, has no clue how to download that “GoToMeeting thing,” or inadvertently downloads ransomware—these issues can make your blood pressure… Read more »

Recently, the terms “software as a service (SaaS)” and “cloud computing” have become interchangeable. But are they actually the same? The Cloud Interestingly enough, though cloud computing is now common knowledge, many people only have a superficial understanding of what it actually is. This is due in large part to the lack of consumer-friendly language… Read more »

There are significant risks in migrating to the cloud. Think about it: you’re leaning on someone else’s computers, software programs, and network. Your success ultimately hinges on their data center infrastructure. The level of uptime, performance, and security you receive is all in their hands. Choose right, and you could see your productivity and revenue… Read more »

It’s common in the tech world to hear people use the terms backup and replication interchangeably. And it’s easy to see why. To backup a file, folder, application, etc., there is some replication involved. But, there are distinct differences between the two in their general definitions and how you can integrate them into your disaster… Read more »

We’re in the midst of a data revolution. Each day we create 2.5 quintillion bytes of data that helps feed a market set to be worth over $203 billion dollar by 2020. Data is the currency of our digital world, and businesses of all sizes are finding ways to use artificial intelligence (AI) and machine… Read more »

Smartphones and other connected devices have become the ultimate work accessories. Whether your company is 100 years old or celebrating its first birthday, the majority of your employees likely use these devices at the office and to work remotely. They have revolutionized the workforce in so many ways, and we can all agree that they’re… Read more »

Back in the day, around 15+ years ago, a method of disaster recovery called tape backup was used to protect the average SMB’s data. Just as it sounds, physical tapes held data and were stored offsite and brought back for extraction if an organization experienced a breach or lost their data. Everything old seems to… Read more »

It’s been one of those bad tech days. Your phone that was on its last legs just went dead. You lost the charger for your tablet, and your laptop seems to be running slower than usual. Is that about to break, too? Well, since you bought it a year ago, the chances of it being… Read more »

Though there are myths about a lack of security in cloud computing, the cloud is oftentimes the safest place you can store your data. The only people who have access to data you store on the cloud are the ones you decide to give access to through password distribution. Plus, it’s a simple way to… Read more »

Shadow IT is one of the more exciting buzzwords to come around in recent years. Sounds somewhat scary, but what does it really entail? Well, in a nutshell, shadow IT refers to using devices, apps, and other resources without the control or approval of senior management. Sounds simple enough, but we’ll delve a bit deeper… Read more »

Are you confident that your IT team is ready to handle a security breach? Though you may have up-to-date firewalls, cybersecurity training programs, data back-ups, file encryptions, and all the other bells and whistles, there is always a chance for holes in your infrastructure to go unnoticed. Don’t worry though, there’s a test for that…. Read more »

Employees are routinely cautioned not to leave their work laptops unattended or use unsecured Wi-Fi networks when they travel for business, but a new threat is cropping up where employees may least expect it: ride-sharing applications. Specifically, a Kaspersky Lab security review finds that of 13 international ride-sharing apps, all revealed several security problems. Researchers… Read more »

By the end of 2017, over 29 million homes in the US had some form of smart technology, and that number was growing at around 31% a year, according to a report from McKinsey. Devices like the Ring and Nest Thermostat help homeowners supervise their homes, often while they are away and are two of… Read more »

The ideal scenario of a smart home and other IoT devices actually sounds quite Utopian. Imagine coming home after a long day and being recognized by your front door. Your smart hub knows how to switch on the heat or AC, start boiling the water in your kettle for tea, and to flick the radio on… Read more »

If you attend any cybersecurity conference, expect to receive a plethora of information from companies promoting their latest solutions for security and protection. These new solutions are have begun to be marketed with their innovative use of artificial intelligence at the forefront. According to ESG research, 29 percent of security professionals surveyed hope to use… Read more »

According to IBM, the volume of spam emails increased 4x in 2016. They also estimate that over half of all email is now spam, much of which includes malicious attachments and/or phishing links. Phishing is the attempt to obtain usernames, passwords, credit card number and other sensitive information by posing as a legitimate company or… Read more »

Security experts continue to fight cyber-threats that compromise both individuals and companies. As quickly as experts can shut down one threat, another one appears to take its place. Criminals have learned to evolve their tactics in an attempt to stay one step ahead of the experts. It can be helpful to educate your users on… Read more »

Businesses see the value in their data, but need ways to turn their raw information into actions that accelerate growth. In our everything-connected world, we create 2.5 quintillion bytes of data a day. It’s a massive amount of information to make sense of, and the servers and desktops that power a traditional business don’t typically… Read more »

Russian election meddling. North Korean hacking. Malicious malware pointed at nuclear programs. Cyber-warfare once seemed like science fiction, though it’s now becoming the modern battlefront. We’ve seen all the scary headlines, but how do we know what’s hype, what’s a genuine threat, and how to defend ourselves (and our clients) from the digital wars of… Read more »

There are dozens of ways for your organization to grow and become more efficient. You can simplify your product and service offerings so employees can focus efforts on a smaller number of things. You can adopt the latest technologies (such as hyper-converged infrastructures) to save time managing systems. But outside of re-thinking how you provide… Read more »

The cybersecurity market is expected to grow to over $230 billion by 2022 according to a report published by Markets and Markets. That means MSPs have a big opportunity to carve out their piece of the pie if they choose to do so. Several high profile security breaches have helped retain the topic at top… Read more »

Occam’s razor is a problem-solving principle stating that the simplest solution tends to be the right one. This is a maxim that IT providers can learn from. With technology, processes, systems, and philosophies evolving, it’s easy to feel overwhelmed. That simple-but-great solution tends to get tangled up like cables in a messy server closet. As… Read more »

Natural disasters are unpredictable and destructive. They can grow or change course without any warning, turning a simple storm into a life-threating hurricane or keeping fires charged as they roll across state lines. Unfortunately, there is only so much we can control when it comes to such disasters. But preparation is one thing we can… Read more »

As the saying goes, a disaster isn’t a matter of if –— it’s a matter of when. Sure, it may sound like a clever marketing slogan, but ask any IT professional, and they will attest that this statement is as true as the sky is blue. The funny thing about disasters is they don’t discriminate…. Read more »

At the beginning of this week, we talked about what you should do in case you need to recover data. However, knowing what “not to do” is just as important as knowing a correct and reliable procedure. That’s why today’s article is going to be focused on the things you should do your best to avoid… Read more »

Engineers at RedLock noticed something unusual while scanning the internet for unsecured cloud servers. As one of the top cloud monitoring and defense firms, RedLock noticed one Kubernetes console (an open source dashboard) was performing crypto-mining on AWS. Further research revealed anyone could access the console because it was not password protected. With access to… Read more »

2017 saw a record number of security breaches. From healthcare organizations to telecommunications giants, cyber villains took no prisoners in striking victims across the industrial landscape. According to the Identity Theft Resources Center (ITRC), the recorded number of security breaches in the U.S. reached 1293 by December 20th — 21 percent higher than the number… Read more »

Whether it’s file corruption, hardware failure, or human error, the mere thought of data loss is unsettling. While it’s natural to drift into meltdown mode, impulse decisions only tend to make matters that much worse. There are right ways and wrong ways to approach data recovery. On that note, here are five strategies we recommend… Read more »

To those in the tech world, it’s no surprise that August is filled with major events and conventions for MSPs, software companies, IT professionals, and anyone who has an interest in the latest technology. VMworld is no exception and this year, VMworld US was hosted in Las Vegas from August 26th – August 30th. Since… Read more »

In this digital age, more and more people are using their smartphones, tablets, and laptops to get their work done. No longer is it necessary to be shackled to a desk because all the data needed to do your job is stationary. Executives, sales representatives, traveling employees, and even employees on holiday are staying in… Read more »

It’s easy to assume that cyber-attacks only happen to big businesses because the media makes it seem as such. We’ve all heard about hacks happening to companies and organizations like Britain’s National Health Service, Virgin America, Yahoo, Equifax, and the Central Intelligence Agency. That’s right. Even the organization meant to uncover and destroy viruses and… Read more »

Ransomware has been around for a while now, but it was not until the WannaCry attack in May 2017 that the public was made aware of their destructive capabilities. WannaCry infected over 300,000 Windows computers by encrypting data on the machines and then demanding Bitcoin to unlock the data. Ransomware a lucrative endeavor and there… Read more »

Han Solo and Luke Skywalker were two of the most skilled fighters in the galaxy. Alone, they were a handful. However, along with the Rebellion’s finest, they teamed up to pose the most significant threat to the Empire’s reign of tyranny. The incredibly complex blended attack follows a similar script. Blended attacks package the elements… Read more »

Though the General Data Protection Regulation (GDPR) has inspired many companies to be more careful with their customer’s data, a large majority haven’t become compliant. According to Deloitte, only one-third (34.5%) of businesses surveyed who are working on their GDPR infrastructure say they have reached full compliance. A Problem Businesses Face with GDPR Compliance The… Read more »

If you’re like many businesses, the strong economic climate is bringing you all kinds of growth opportunities and new business. However, with unemployment rates right around 4 percent, a lot of great people are already happily working. Bringing on new staff isn’t always as simple as posting a few ads in the local classifieds or… Read more »

Get a handle on your big data and prepare for any unexpected disasters with help from StorageCraft. If you’ve kept up-to-date with our latest blog posts, you’ll know that the countdown to our product launch is on. As of August 20, 2018, clients will be able to purchase a platform that ties all their StorageCraft… Read more »

Have your eye on Disaster-Recovery-as-a-Service (DRaaS)? You are not the only one. A report from MarketsandMarkets estimates that the global DRaaS industry will reach $12.54 billion in 2022 — up from $2.19 billion in 2017. The increase represents an impressive 17.29 percent compound annual growth rate (CAGR). According to the report, the MSP segment of… Read more »

To maintain a competitive edge, critical infrastructure components must be easy to afford, deploy, and manage — all while eliminating the data and application silos that can prevent an organization from reaching its full potential. An IDC study found that reducing IT complexity resulted in annual cost savings of $3610 per user. Unfortunately, getting there… Read more »

SMBs and other companies are facing many challenges and changes when it comes to present-day data storage. Big data is making it difficult and expensive to manage storage hardware, but the option to harness the cloud is improving storage infrastructures for small and large businesses alike. The solution to the storage crisis lies in infrastructure… Read more »

Hyper-converged infrastructure systems (HCI) are becoming a new standard for many businesses. Research firm Forrester even predicts that HCI will become a ubiquitous platform for on-premises deployments. If you’re not using it now, there’s a good chance you’ll want to soon. Like converged infrastructure (CI), HCI brings together virtualization, storage, compute power, and even network… Read more »

One of the tough things about data growth isn’t necessarily turning data into intelligence or finding a way to store all the information a business creates and gathers. Instead, it’s finding smart ways to store data. It’s not that data storage is necessarily expensive, it’s that data loss and poor data retention policies can be… Read more »

In our previous post, we talked about the importance of developing an effective process and keeping thorough documentation of client expectations, projects, as well as timetables. We also touched on defining the challenge and keeping a reasonable, realistic budget. This article will continue to showcase some effective policies and practices to help your IT team… Read more »

As more and more data is being produced, IT departments are having to deduce the best way to move forward with storage. The server rooms and hard drives of yesterday are proving to be far too bulky to provide the storage companies need to store, sort and protect their data. The future of data storage… Read more »

Amazon Web Services (AWS) has maintained its grip as the leader in cloud computing with a 33% market share, according to Synergy Research Group. AWS has kept this margin now for 12 quarters while the cloud market has tripled in size. Microsoft, IBM, and Google have also grown their market share, but they have not… Read more »

Are you happy with how you and your team manage projects? Are there ways you could be more efficient? Are you tracking enough even to know whether you’re effective? Certainly, larger IT projects are tough. When there are lots of people and tasks, project timelines deteriorate quickly if there isn’t someone managing the process. Projects… Read more »

Big data is one of the latest victims of buzzword fatigue. Once the talk of the town, the term was dropped from the hype train years ago in favor of various other promising trends. Some pundits have even said big data is dead. In this post, we’ll examine three case studies that suggest big data… Read more »

Data analytics seem like a tough nut to crack, particularly for smaller businesses. The questions on the mind of many small-shop decision-makers are this: Why should you care about data analytics at all? What can they help you do and are they practical for your business? Data analytics can help businesses of nearly any size…. Read more »

As the saying goes, “Old habits die hard,” and that saying rings as true in IT as it does in life. Some old habits are still helpful. For example, it is always wise to avoid shopping on unsecured wireless networks as well as avoid simple passwords. That being said, we often cling to those practices… Read more »

Once business sectors can sort and analyze big data, their potential efficiency and earnings will skyrocket. Organizations in almost every industry can benefit. For example, retail companies will be able to maintain a useful database of customer information to hyper-target and personalize their communications, insurance companies will be able to simplify their premium calculating systems,… Read more »

“The big data boom is the innovation story of our time.” That quote is from a story in the Atlantic nearly seven years ago. Yet it might as well have been made last month because we are finally watching big data transform industries from finance to health care. These and other industries which embrace big… Read more »

2017 was an exciting year for the Internet of Things movement. The industry saw tremendous growth and is projected to experience an even bigger surge this year. According to IDC, global IoT revenue is on track to reach $772.5 billion in 2018, an estimated 14.6 percent increase from the $674 billion tallied for 2017. IDC… Read more »

One of the major challenges SMBs and big business face today is devising proper sorting and storing of Big Data. We’re at a point now where the number of emails sent, files downloaded, texts exchanged, etc. has overwhelmed outdated methods of storage. Methods like stand-alone servers and USB drives now need advanced storage and sorting… Read more »

It’s safe to say if you work in the IT world, you have probably heard about both the Internet of Things and Big Data. In a lot of ways, the two terms refer to completely different concepts. The IoT encompasses all things connected — like a smart home to a connected car. Big data refers… Read more »

Big data is one of the hottest topics in technology today. An array of technologies has come together to make real-time analytics possible for companies both big and small. These include advanced NoSQL databases, data virtualization, and distributed storage along with many software tools that predict the most useful data. The amount of data each… Read more »

The amount of time people surf, stream and share online on a day-to-day basis is immense. Multiply that by the number of people using their computers and the web and you’ll be left with a number that is near-inconceivable. Now imagine how much data billions of computer users will develop and exchange at any given… Read more »

If there is one word, to sum up, the tech scene in 2018, transformative might be the best fit. This year has been dominated by trends with the sort of transcendent promise that demands attention from savvy business leaders and IT experts alike. On that note, here are some highlights from six of the most… Read more »

Whether your head office location was hit by a hurricane, or your systems are locked by a cyberattack, downtime in all its forms can be incredibly detrimental to the revenue and reputation of a business. Some Scary Numbers Downtime costs a lot. Statistically speaking it is the second largest expense after HR. According to ITIC,… Read more »

IT speak often comes off as an entirely different language to those who are unfamiliar with all the terminology and jargon. This is especially the case in a highly technical field such as disaster recovery. Never fear! Our disaster recovery glossary will help you keep up when discussing one of today’s fastest moving industries. Backup:… Read more »

On May 25, 2018, the European Union (EU) officially implemented the widely discussed General Data Protection Regulation (GDPR). The act applies to any business that collects, stores, and processes confidential information belonging to European consumers. This would explain why the collective internet was recently bombarded with emails regarding privacy policy updates from nearly every website… Read more »

As the saying goes, a good offense is a great defense. When it comes to cybersecurity, taking the correct measures before a cyber-attack occurs is a necessary first step in securing your data from a breach. Implementing preventative technology to thwart things like ransomware and phishing should be a large focus of your security strategy…. Read more »

When people hear the word “cyberattack,” generally a few of the more popular hacks will come to mind. Ransomware is all over the news these days with some of the most prominent attacks of the last couple years being ransomware attacks, like WannaCry. Trojans are also a virus staple that tech users, from basic to… Read more »

Over the past year I have met with hundreds of MSPs. Something that strikes me is the varying approach in how they sell disaster recovery products and services. At one end of the spectrum are those who are selling “backup,” and at the other end are those who are delivering disaster recovery (DR). In my… Read more »

Transcript: Hello, this is Wes Gill from StorageCraft. In this tutorial, I’ll show you how to configure a ShadowProtect SPX backup using ConnectWise Automate. Inside control center, select a computer that has SPX installed then click the plug-in icon and then the StorageCraft tile. Click on destinations and then new. Our first step is to… Read more »

The IT world is no longer a stranger to ransomware. All of us are aware of the vast amount of damage it can do, only having to look so far as last year’s WannaCry virus for an example of its destructive capabilities. But what happens when ransomware is used on platforms other than computers and smartphones, like connected… Read more »

About the Recovery Zone

This online digest is dedicated to exploring BDR solutions and technology relevant to MSPs, VARs, and IT professionals.

The Recovery Zone is brought to you by StorageCraft, a company that has been producing software solutions for backup, disaster recovery, system migration, virtualization, and data protection for servers, desktops, and laptops since 2003.